You wake up, make coffee, sit down by the computer and start reading your favorite web sites. You fire up your favorite browser and type 'www.site.com' on the address bar, hit enter and continue sipping on that coffee. You wait for the page to load, sipping some more coffee - a few seconds later you get the Google search results for 'www.site.com'. You scratch your head, sip some more coffee, and start wondering if you did a typo, but no it is correct - Google is not correcting your spelling. more
The key to fixing any part of the Internet infrastructure is to understand the business cases for the parties whose behavior you want to influence and design the technology accordingly. People who follow this approach (Sir Tim Berners-Lee and the World Wide Web) have a chance of succeeding. People who ignore it (DNSSEC, IPv6) will fail. The root problem here is that the ICANN DNS does not differentiate between the parts of the Internet that are accountable and those that are not. more
We now know how wireless carriers are going to continue the string of new G generations of cellular technology. 5G was originally defined to include spectrum up to 90 GHz or 100 GHz. In the last few years, international standards bodies have been developing new 6G standards in what is called the terahertz wavelengths between 100 GHz and 1 THz. more
A fabled, serial cybersquatter of the early Internet argued that typographical errors in domain names were not cybersquatting at all because they had their own distinct identities. Moreover, "I have" (he argued) "just as much right to own the [misspelled] Domain Names as the person who owns the correct spelling of [a] domain name." That dispute involved and <wallstreet journel.com>. Dow Jones & Company, Inc. and Dow Jones LP v. John Zuccarini, D2000-0578 (WIPO September 10, 2000). more
Our world finds itself at a critical juncture. Both trillions of dollars and the future of human communications including fundamental access to it are at stake. For telecom operators and media outlets there is not a migratory way from where we are to the future. There is a clear consumer shift underway that runs in the opposite direction to that of telecom and media incumbents; emergent social practice is increasingly clashing with the very structure and desires of incumbent players... It was for these reasons that one of the six keynote speakers invited to Spring 2009 Emerging Communications Conference (eComm) in San Francisco was Richard Whitt, Google's Washington Telecom and Media Counsel. His keynote was entitled, Tinkering without Tampering: Wrestling with Convergence and Communications Policy... more
Artificial intelligence (AI) has become synonymous with innovation, transforming industries at an unprecedented pace. While some may frame AI as a groundbreaking development of our time, it's essential to acknowledge that its roots run deep. AI has evolved immensely from early tools like the abacus to present-day GPU-driven large language models. What sets the current landscape apart? The sheer scale of data, computational demand, and complexity of workloads. more
Internet root servers will soon allow domain name registrations in nine Indian scripts, according to Universal Acceptance Steering Group (UASG). more
Russians have targeted Ukrainian electricity and communication infrastructure. In some areas, there may not be any utility poles left standing, and underground conduits may have been bombed to oblivion. Starlink has been an important tool for these brave people to coordinate their resistance to Putin's brutal invasion. Satellite communication doesn't require any middle-mile infrastructure. more
The ICANN community recently gathered in Kobe, Japan for its first meeting of the year and it was certainly a busy week for attendees. Much of the meeting centered around the work of the Expedited Policy Development Process (EPDP) to address gTLD registration data. As a member of the EPDP team, we had been hard at work since being formed in August of 2018. Just prior to the Kobe meeting, we published the phase 1 Final Report. more
Like many of you, I am keenly following the Comcast-Level 3 dispute and am trying to make sense of it all. The dispute confirms several universal principles about Internet traffic routing that have passed the test of time. ... Consumers pay Internet Service Providers ("ISPs") a monthly subscription with the expectation that the fee covers access to available content, i.e., the conduit. As the World Wide Web evolves and content options diversify to include full motion video, consumers simply expect their ISPs to make sure the download distribution pipes are sufficiently robust to handle high bandwidth requirements and commensurately large monthly download volume. more
Utopia: the definition brings about visions of an "ideal place or state", or "a system of political and social perfection." Thus became the name chosen for a consortium of sixteen Utah cities building their own broadband infrastructure with a fiber-to-the-premise architecture, while offering residents a clear and alternative choice to incumbent operators, including Quest and Comcast. Is it perfection or fantasy? more
Casey Lide and Thomas B. Magee of Keller & Heckman highlight an issue that anybody building fiber on utility poles should be aware of. A recent article on their website notes that in some cases, an easement obtained for using private land to bring electric service might not automatically allow an easement for bringing fiber. more
Crypto-anarchism (or crypto-anarchy) is a form of anarchy accomplished through computer technology. Crypto-anarchists develop and employ their own cryptographic techniques to prevent knowledge of the information or even the identity of parties communicating over networks. The motivations vary - from just having fun and causing turmoil, to achieving perceived status within a crypto-anarchy community, to furthering socio-economic views about information availability, absolute privacy, political advocacy and spreading anti-government paranoia. more
Together with Thorsten Holz, I recently published a paper on fast flux botnet behaviors, "As the Net Churns: Fast-Flux Botnet Observations," based on data we gathered in our ATLAS platform. Fast flux service networks utilize botnets to distribute the web servers to the infected PCs... One of the most well known fast flux botnets has been the Storm Worm botnet, which uses the zombies to spam, send out new enticements to infect users, and to host the malicious website which delivers the malcode. more
There is a definite advantage to knowing what users look for when typing in domain names that they think should work. This article from Government Computer News shows an excellent example in .gov. "600,000 visitors a year to FirstGov try to find the federal government's Web site by typing USA.gov into their browser", so they switched from firstgov.gov to usa.gov. It wasn't mentioned in the article, but firstgov.gov redirects automatically; this is more intelligence than I normally expect from US government web sites. more